1. SOFTWARE THEFT
GROUP MEMBERS:
BALVEENDERJIT KAUR
DASWEEN KAUR
NUBASHINII
SURINDER KAUR
LECTURER:
MISS CHRISTINE
2. WHAT IS SOFTWARE THEFT?
• is
the unauthorised
copying or distribution of
copyright protected
software.
3. WHEN DOES IT OCCUR?
Occurs when someone :
1. Steals software media
2. Intentionally erases programs
3. Illegally copies a program
4. Illegally registers or activates a program
5. TYPE 1
Involves a perpetrator physically stealing a media
that contain the software or the hardware that
contains the media
Example : An unscrupulous library patron might
steal the Encyclopedia Britannica optical disc.
6. TYPE 2
Occurs when a programmer is terminated from, or
stops working for, a company.
The programs are common property but some
dishonest programmers intentionally remove or
disable the programs they have written from
company computers.
7. TYPE 3
Occurs when software is stolen from software
manufacturers.
Also called piracy
Most common form of software theft
Software piracy is the unauthorized and illegal
duplication of copyrighted software.
8. TYPE 4
Involves users illegally obtaining registration
numbers or activation codes.
Keygen a program, short for key generator, creates
software registration numbers and sometimes
activation codes.
Some create and post keygens so that users can
install software without legally purchasing it.
9. SAFEGUARD AGAINST SOFTWARE THEFT
To protect media from being stolen, owners should
keep original software boxes in a secure location.
All computer users should backup their files
regularly.
Escort terminated employees immediately to
protect their softwares and programs (in big
companies)
10. Software manufacturers issue users license
agreement.
A license agreement is the right to use a software.
The most common type of license is single-user
license agreement or known as end-user license
agreement (EULA)
11. In this agreement, users are permitted to:
o Install the software on only one computer.
o Make one copy of the software as a backup.
o Give or sell the software to another individual, but
only if the software is removed from the user’s
computer first.
12. Users are not permitted to :
Install the software on a network, such as school
computer lab
Export the software
Rent or lease the software